Tag: vulnerabilities

GAO: Help Securing Connected Cars is Years Away

In-brief: Security improvements for connected cars may be years away, as both the government and industry struggle to catch up on the cyber security issue, a GAO report found. 

Verizon: No ‘Real World’ Internet of Things Risk. Really?

In-brief: Verizon said in its 2016 Data Breach Investigations Report that it found no “real world” data on cyber incidents tied to Internet of Things technologies. Really?

Expert: FDA Cyber Guidance For Medical Devices Needs More Work

In-brief: A prominent expert in medical device security has warned the FDA that its draft guidance for post market medical devices is too focused on stomping out known threats, and not enough on addressing current and future risks to the security of healthcare environments.

Antivirus Players Vying for Industrial Control Systems Business

In-brief: news from incumbent endpoint protection firms Symantec and Kaspersky Lab that they are ramping up efforts to sell their wares into industrial control systems environments suggests that the death of anti virus may have been greatly exaggerated. 

Blurred Lines: Sophisticated Hacks Building On Commodity Crime Tools

The information security industry has long operated with the premise of two, very different kinds of threats: indiscriminate, cyber criminal activity aimed at making money quick and sophisticated, targeted attacks intended to provide long term competitive advantage to another company (or economy), disrupt the operation of the target or provide a (future) strategic advantage in some kind of cyber conflict. But new research from FireEye suggests that the lines between sophisticated and unsophisticated cyber operations are blurred, making it hard for organizations to know if a given infection is merely bad luck, or evidence of a larger and more dangerous operation. Writing about a new financially motivated hacking crew called Fin6, FireEye said that the group, which targeted point-of-sale systems made off with “millions of payment card numbers.” Still, FireEye said that it couldn’t figure out how the group compromised its victims. “In Mandiant’s investigations of FIN6, the group already […]